Penetration Testing mailing list archives
RE: Covert Microphone Application
From: "Mermod, Denis" <Denis.Mermod () EssexCorp com>
Date: Thu, 27 Jul 2006 07:37:35 -0400
Remote into the laptop (use the standard remote software built in) and activate the mic program. No fancy schmancy needed - I believe you can remote in via RDC or via registry (find mic hive(s)) and turn them on. Can you get two laptops? Denis Mermod, MCP, NSA IAM Information System Security Officer Essex Corporation 9020 Junction Dr. Annapolis Junction, MD 20701 dmermod () essexcorp com 301-617-8916 (Office) 410-370-0227 (Cell) 301-688-2200 Pin 5441 (Pager) -----Original Message----- From: shiri_yacov () yahoo com [mailto:shiri_yacov () yahoo com] Sent: Wednesday, July 26, 2006 5:55 AM To: pen-test () securityfocus com Subject: Covert Microphone Application Hi all, I have recently entered with my boss to our corp. conference room to discover a new (shining) internet laptop on a side desk in the room. During our chat I mentioned that the laptop has a builtin microphone and therefore enables covert eavsdropping in case the laptop is "ruled" from remote position, and therefore, a conference room PC should have no builtin mic. My sceptic boss replied instantly - "I challange you, bring me a recording of any meeting - I`ll replace the laptop, and you`ll receive it." I therefore need a small covert application (no need in process hiding), which will record microphone input to file. command line application is perfect. Do any of you know any ? Guys, I gotta have this laptop... Regards, Shiri ------------------------------------------------------------------------ ------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------ ------ ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Covert Microphone Application, (continued)
- Re: Covert Microphone Application Volker Tanger (Jul 30)
- Re: Covert Microphone Application Matt Burnett (Jul 31)
- Re: Covert Microphone Application Aaron (Jul 31)
- Re: Covert Microphone Application Matt Burnett (Jul 29)
- Re: Covert Microphone Application Kish Pent (Jul 27)
- Re: Covert Microphone Application David Bergert (Jul 27)
- Re: Covert Microphone Application Frank Knobbe (Jul 29)
- RE: Covert Microphone Application Shenk, Jerry A (Jul 27)
- RE: Covert Microphone Application Miguel Valentin (Jul 27)
- Re: Covert Microphone Application s-williams (Jul 27)
- RE: Covert Microphone Application Mermod, Denis (Jul 27)
- RE: Covert Microphone Application Mark Teicher (Jul 27)
- Re: RE: Covert Microphone Application mr . nasty (Jul 27)
- Re: Covert Microphone Application Krpata, Tyler (Jul 27)
- RE: Covert Microphone Application Craig Wright (Jul 27)
- Re: Covert Microphone Application Mike Kuriger (Jul 29)
- RE: Covert Microphone Application Craig Wright (Jul 29)
- RE: Covert Microphone Application Craig Wright (Jul 31)
- Re: Covert Microphone Application Mike Kuriger (Jul 29)
- Re: Covert Microphone Application barcajax (Jul 27)
- RE: Covert Microphone Application Jacob, Pete (Jul 29)
- re: Covert Microphone Application gg (Jul 30)